Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing.Published in:Journal of Cryptology, 2004, v. 17, n. 2, p. 125, doi. 10.1007/s00145-004-0134-yBy:Beimel, Amos;Ishai, Yuval;Malkin, TalPublication type:Article
RSA-OAEP Is Secure under the RSA Assumption.Published in:Journal of Cryptology, 2004, v. 17, n. 2, p. 81, doi. 10.1007/s00145-002-0204-yBy:Fujisaki, Eiichiro;Okamoto, Tatsuaki;Pointcheval, David;Stern, JacquesPublication type:Article
The Full Cost of Cryptanalytic Attacks.Published in:Journal of Cryptology, 2004, v. 17, n. 2, p. 105, doi. 10.1007/s00145-003-0213-5By:Wiener, Michael J.Publication type:Article